Chapter Five:  Fiscal Affairs

Procedure Title:  SouthArk Wireless Network Policy
Based on:  Board Policies 4 & 7
Procedure Number:  5.40b
Date Adopted/Revised:  March 16, 2015; November 30, 2015; August 9, 2017

  1. The purpose of this procedure is to secure and protect the information assets owned by South Arkansas Community College (SouthArk). SouthArk provides computer devices, networks, and other electronic information systems to meet its mission, goals, and objectives. SouthArk grants access to these resources according to an individual’s role and must manage them responsibly to maintain the confidentiality, integrity, and availability of all information assets.
    1. This procedure specifies the conditions that wireless devices must satisfy in order to connect to the SouthArk network. Only those wireless infrastructure devices that meet the standards specified in this procedure or are granted an exception by Information Technology Services are approved for connection to the SouthArk network.
    2. All College computing and networking facilities are provided for use by faculty, staff, and students for relevant academic, research, or administrative pursuits. As with all other College facilities, private use must be approved in advance in keeping with policies expressed in the South Arkansas Community College Employee Handbook and the South Arkansas Community College Catalog. These resources may not be used for commercial purposes. Any traffic traversing this network is subject to the acceptable use policies of the College. Data files and messages traversing the College network are not private communications. The College reserves its right, as owner, to examine, limit, log, capture, archive, and otherwise preserve or inspect any messages transmitted over the SouthArk network.
    3. SouthArk makes absolutely no warranties of any kind, either expressed or implied, for the services it provides. The College will not be responsible for any damages suffered by users. Such damages include, but are not limited to, any loss of data that results from delays, non-deliveries, misdeliveries, or service interruptions caused by either its own negligence or by user errors and/or omissions. Any and all use of any of the information obtained via the Internet is at the user’s own risk. SouthArk specifically denies any responsibility for the accuracy and/or quality of any information obtained through its Internet services.
  2. This procedure addresses the requirements of wireless deployments, wireless use, and wireless airspace use. All employees, students, contractors, consultants, temporary workers, and others who use the SouthArk network, including all personnel affiliated with third parties that maintain a wireless infrastructure device on behalf of SouthArk, must adhere to this procedure. This procedure applies to all wireless devices that connect to the SouthArk network or reside at a SouthArk owned, leased, or rented site that provide wireless connectivity to endpoint devices including, but not limited to, laptops, desktops, cellular phones, and tablets. This includes any form of wireless communication device capable of transmitting packet data.
  3. Service Set Identifier (SSID)
    These SSIDs will be broadcast by the wireless deployment:
    Conference – For visitor Internet access.
    SouthArk – For college owned devices or devices needing access to broadcast traffic in the College’s academic network.
    SouthArk Hotspot – For Faculty, Staff, and Student Internet and SouthArk network access.
  4. Wireless Service Considerations:
    1. Wireless networking has bandwidth limitations compared to the wired network. The wireless network should be viewed as augmenting the wired network, to provide more flexible network use. Applications that require large amounts of bandwidth, or are sensitive to changes in signal quality and strength may not be appropriate for wireless access.
    2. Wireless technology is (and will for the foreseeable future be) a shared bandwidth technology. Some protocols and services will not effectively work in, or may be inappropriate for, a wireless environment.
    3. DHCP (Dynamic Host Configuration Protocol) is the standard addressing method for the SouthArk wireless networks, and it is expected to meet the majority of client requirements.
    4. Wireless is a dynamic service. Because of the dynamic nature of wireless, IP space serving the campus will change over time as a result of capacity re-engineering.
  5. Restrictions:
    SouthArk requires that all deployments of wireless infrastructure be installed and maintained by Office of Information Technology (OIT) staff. Installing departmental or do-it-yourself wireless access points is prohibited to avoid possible interference with the SouthArk wireless network, unnecessary impact to the wired network and undue security risks to the College. Instances in which academic instruction or business practices require departmental wireless access points may be permitted under the guidance of the Office of Information Technology but only after project review. OIT staff must have full administrative access to all equipment permitted; continuing authorization is not guaranteed and may be revoked without notice.
    1. Use of the wireless network is subject to the established policies for use of SouthArk network services.
    2. Only devices authenticated via SouthArk account credentials may access network resources.
  6. Role-based access to the network shall be established using the user’s SouthArk account credentials. Services allowed through the wireless network should be substantially identical to those for wired access. Role based users will be limited to those same services they are permitted to access via wired network controls.
  7. Visitors:
    Individuals attending scheduled Conference Center, Workforce, or Library events will be provided login credentials when registering for their event. Temporary access credentials may be obtained by other parties by direct application to the Office of Information Technology. Temporary credentials will be modified weekly or following any event with (6) six or more users. Finally, local residents may obtain wireless access by applying formally for SouthArk library privileges and receiving login credentials.
  8. Device Support:
    SouthArk does not guarantee support for all wireless devices. OIT staff will assist individuals seeking access to the College’s wireless network as part of support for Conference Center events, student services, or as workload permits. Users seeking support must have sufficient knowledge of their devices to navigate to the software required to initiate wireless connections and/or access network resources.
  9. Wireless Airspace:
    To provide wireless access, the radio frequency airspace of the campus serves as the transport medium for this technology. Wireless networks operate on the campus’s shared and finite airspace spectrum. Therefore, Office of Information Technology (OIT) staff will regulate and manage this airspace centrally to ensure its fair and efficient allocation and to prevent collision, interference, unauthorized intrusion, and failure. In addition, central management will facilitate the adoption of new features. Persons using wireless devices to connect to the College's network must comply with this procedure and any other related policies.
  10. OIT staff will approach the shared use of the wireless radio frequencies in the same way that it manages the shared use of the wired network. Specific issues pertaining to wireless network devices are outlined below:
    1. All access points will be installed and configured in such a way as to comply with all security features of the wireless network, including restrictions to provide connections only to those users who are entitled to access.
    2. The College reserves the right to remove, disconnect, or electronically limit any access point not installed and configured by OIT staff or specifically covered by prior written agreement and/or arrangement with the OIT.
    3. Other devices such as portable phones, and wireless devices using "Bluetooth" (a competing wireless technology), that broadcast and receive information on the same frequency as wireless Ethernet devices, may cause interference with wireless network operations. If disruptions in wireless service are reported, OIT staff will investigate and can remove any devices it deems, in its sole discretion, to be interfering with proper network operation.
    4. Only users affiliated with SouthArk are authorized to use wireless networking on campus. To help protect these affiliated users from unauthorized access to their computer resources, OIT staff may implement data encryption and authentication security measures that must be followed by all users. These measures may require the use of specific SouthArk wireless LAN product types and are designed to meet emerging wireless encryption and security standards.